ELI5 Cryptocurrency, cryptography, software development and information security. Our latest featured cryptocurrency knowledge base articles including basic concepts, software development, technical articles, easy to follow ELI5 introductions to technical concepts and much more!
ELI5 How to mine Litecoin
Litecoin has consistently been one of the most popular cryptocurrencies since its inception in 2011.
It was initially forked from the main Bitcoin source code by a developer ca...
Understand the Double Spending problem
As the name implies, the double spending problem consists in executing a transaction twice while subtracting just once from your account balance.
This, of course, can only hap...
avax-python Network Message Pipeline
Here's a short overview of the avax-python Avalanche message pipeline.
We've followed the reference Go implementation as closely as possible, but the Python code is still in ve...
avax-python Implementation Notes
Here you'll find a few implementation notes about avax-python. This is mainly targeted at developers who wish to work on the Python source code.
Python <- Go
Scrape AVAX network peers using avax-python
P2P networking is the single most important technical functionality in all cryptocurrency implementations. The decentralized nature of Bitcoin, AVAX, Ethereum and others requires ...
We are 100% ad and tracker free.
Help sponsor us by donating to 🔺 X-avax1n7j2g4arl76l8p0tefdu0w36kcue4v5fr44yfg 🔺
Any amount is welcome! Thank you! ❤
Our Avalanche [AVAX] Price Prediction [Opinion]
If you’ve been following us, then you may have read that we believe Avalanche AVAX is a 20x investment. Why, you may ask? Because we think AVAX is definitely a top 10 cryptocurrency. And, by reaching top 10, Avalanche would have gained 20x at today’s prices. But first, an important legal notice. Disclaimer Nothing in […]
cavax – Experimental C language tools for AVAX Avalanche exploration
cavax is an experimental implementation of C language utils for the exploration of the Avalanche AVAX protocol. Initially, cavax supports limited networking and basic passive functionality (e.g. it does not actively verify vertices). cavax listens to the Avalanche network and calls hooks that you can set up to handle each message type. Some default hooks […]
Generate AVAX addresses and keys from a mnemonic phrase in Python
ELI5 How AVAX validation works [Avalanche Protocol]
According to the Avalanche AVAX token distribution policy, almost 50% of all AVAX in existence will go towards validator rewards (see chart at the top). Since the Avalanche protocol burns all fees, the only source of inflation in the AVAX ecosystem is the validation reward. This presents a great opportunity for those who join the […]
Concepts In This Page
A process or system by which multiple parties are able to reach consensus. In the context of cryptocurrencies, it's the process which allows for everyone to agree on everyone else's money balance. E.g. Bitcoin employs Nakamoto consensus via PoW mining.
Proof of Stake
Proof of Stake is a consensus mechanism in which block verifiers prove their commitment to the network by staking their coins instead of by proving they performed some work (contrast with Proof of Work).
Staking is the process by which users delegate their Proof of Stake voting rights to a staking pool. The pool then verifies transactions on the users' behalf and, similarly to mining pools, share some of the profits back with the stakers.
Litecoin is a first generation cryptocurrency which was originally forked from the Bitcoin source code. It substituted Bitcoin's SHA256 hashing algorithm for Scrypt as an attempt to make ASIC mining impossible.
A PoW based mining method by which Litecoin transactions are verified and blocks get produced.
Double spending is a condition where the same value can be spent twice, revealing a flaw in the payment processing system.
Irreversible transactions are a characteristic of digital payment systems which offer trustless decentralization. The irreversibility is necessary in order to guarantee that no transaction will be undone once committed by the network.
Cryptography and cryptocurrency based gaming.